Analysis of Security Requirements of Futuristic Mobile Applications

[1]  T. Greenhalgh,et al.  Adoption, non-adoption, and abandonment of a personal electronic health record: case study of HealthSpace , 2010, BMJ : British Medical Journal.

[2]  Chin-Ling Chen,et al.  The design of a secure anonymous Internet voting system , 2004, Comput. Secur..

[3]  Ling Liu,et al.  Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[4]  Luc Bouganim,et al.  Secure personal data servers , 2010, Proc. VLDB Endow..

[5]  Noboru Sonehara,et al.  Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.

[6]  Reihaneh Safavi-Naini,et al.  Privacy preserving EHR system using attribute-based infrastructure , 2010, CCSW '10.

[7]  Eric Horvitz,et al.  Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.

[8]  Yuguang Fang,et al.  SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[9]  Henning Müller,et al.  Strategies for health data exchange for secondary, cross-institutional clinical research , 2010, Comput. Methods Programs Biomed..

[10]  Mark A. Rothstein,et al.  Compelled Authorizations for Disclosure of Health Records: Magnitude and Implications , 2007, The American journal of bioethics : AJOB.

[11]  Alexander Hörbst,et al.  Attitudes and behaviors related to the introduction of electronic health records among Austrian and German citizens , 2010, Int. J. Medical Informatics.

[12]  Cyrus Peikari,et al.  Maximum Wireless Security , 2002 .

[13]  Jie Wang,et al.  Towards a practical, secure, and very large scale online election , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[14]  Dimitris Gritzalis,et al.  Secure Electronic Voting , 2003, Advances in Information Security.

[15]  Marinella Petrocchi,et al.  SEAS, a secure e-voting protocol: Design and implementation , 2005, Comput. Secur..

[16]  Leslie S. Liu,et al.  Barriers to the adoption and use of personal health record systems , 2011, iConference.

[17]  Johannes A. Buchmann,et al.  Introduction to Cryptography , 2001 .

[18]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[19]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[20]  Thomas Neubauer,et al.  A methodology for the pseudonymization of medical data , 2011, Int. J. Medical Informatics.

[21]  Maryam Ahmadi,et al.  Security Requirements and Solutions in Electronic Health Records: Lessons Learned from a Comparative Study , 2010, Journal of Medical Systems.

[22]  Berry Schoenmakers Compensating for a lack of transparency , 2000, CFP '00.

[23]  Thad E. Hall,et al.  Internet Voting in Comparative Perspective: The Case of Estonia , 2009, PS: Political Science & Politics.

[24]  Kåre Vollan Voting in Uncontrolled Environment and the Secrecy of the Vote , 2006, Electronic Voting.

[25]  Mario Piattini,et al.  Security requirements engineering framework for software product lines , 2010, Inf. Softw. Technol..

[26]  Dimitris Gritzalis Principles and requirements for a secure e-voting system , 2002 .